[vc_row][vc_column][vc_column_text]A new hack has been announced and it's affecting over 2 million users. The infected application is called CCleaner and it's one that even we have mentioned in the past because it's free and works well to run file clean up to remove...
IT security
Data Security Warning: Hurricanes Bring Out the Scammers
[vc_row][vc_column][vc_column_text] In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to...
6 Biggest Concerns of IT Experts Today
[vc_row][vc_column][vc_column_text]Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it's all for naught. With all of the headlines about ransomware and...
Invasion of the IoT: Your Kid’s Toys Can Spy On You
[vc_row][vc_column][vc_column_text]The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It's a wonderful,...
Move Over Ransomware, Wiperware Is Coming to Town
[vc_row][vc_column][vc_column_text]We've talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most...
5 Principles of Protection for Your SMB
Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren't enough funds to spread around. The flip side of that issue, though, is that...
May the Fourth Protect You – It’s World Password Day
[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...
Fake Emails to Ignore to Protect Your Cybersecurity
Hackers can be very clever, there's no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here...
[Infographic] The Beastly IT Security Threats – A MUST READ
[vc_row][vc_column][vc_column_text]Data and IT Security are at the forefront of everyone's concerns these days. The news is overrun with headlines about breaches of corporations that you'd imagine would have tremendous security measures in place, but still fall victim...
Is Your Data Security Budget a Waste of Money?
[vc_row][vc_column][vc_column_text]When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have...